dma - Handle .forward files for local users
- The helper program will check if the .forward file in the user's home
directory exists and has the correct permissions.
- By now, redirection to files and/or pipes is not possible. Just user
names and email addresses.

dma - Add a function to get an user home dir2015-03-11T17:57:40ZAntonio Huete Jimeneztuxillo@quantumachine.netAntonio Huete Jimeneztuxillo@quantumachine.net2015-03-11T17:57:40Zhttp://gitweb.dragonflybsd.org/~tuxillo/dragonfly.git/commitdiff/01a3cc7863d0468b19fb6fee1df6d6132c7f37b6

rtsock: Make sysctl NET_RT_DUMP MPSAFE.
- Add rn_walktree_at(), which walks the radix tree from a target node,
if it could be found, or from the closest node of the target node.
- Allocate temporary buffer for rtm batch, which should be large enough
for duplicated keys. We could consider reallocate it if there are
any real cases that this temporary buffer could not hold rtms for all
duplicated keys. In the current implementation, it just logs one
error and stop.
- Convert the rtentries to rtms in temporary buffer in netisr; unlike
what we do for inpcbs, routing table could be in inconsistent state
(due to blocking malloc), if we are not accessing the routing table
in netisr. If there is no more space in the temporary buffer, the
current rtentry's key and netmask are saved and we will start from it
next time. Since rn_walktree_at() only starts from the first node of
duplicated keys, we have to make sure that there is enough space for
all duplicated keys in the temoprary buffer.
- Once the temporary buffer can't hold more rtms, the rtms in it will
be delivered to userland. And we start converting the rtentries in
netisr from the last node again, until all rtentries are iterated.

ipfw/ipfw3 - Document new sysctl, clean-up manual pages
* Document the new net.filters_default_to_accept sysctl and tunable.
* Adjust the ipfw3 manual page to call the program 'ipfw3' rather
than 'ipfw'.

ipfw/ipfw3 - Add pre-load sysctl to default filter to accept
* Add sysctl and tunable 'net.filters_default_to_accept', which defaults
to off. If this variable is set to non-zero prior to loading the ipfw
or ipfw3 modules, IPFW will default to allowing all packets through instead
of denying all packets.
* It is necessary to use this feature for netbooted systems with NFS roots
as the system will not be able to load the rules table after kldloading
the related module(s) otherwise.

kernel/usb4bsd: Unbreak building with USB_DEBUG in the config.2015-03-12T21:56:49ZSascha Wildnersaw@online.deSascha Wildnersaw@online.de2015-03-12T21:56:49Zhttp://gitweb.dragonflybsd.org/~tuxillo/dragonfly.git/commitdiff/a9b765b780f7f2d365fcd96e0f99b8e463369497

New IPFW2 for DragonflyBSD which is:2015-03-08T17:49:34ZBill Yuanbycn82@gmail.comMatthew Dillondillon@apollo.backplane.com2015-03-08T17:49:34Zhttp://gitweb.dragonflybsd.org/~tuxillo/dragonfly.git/commitdiff/f860c634d16f94793f6aafc4868bc56844ce4385

New IPFW2 for DragonflyBSD which is:
1. source clean and following the Dfly coding style.
2. able to run parallelly together with the existing ipfw.
3. support in-kernel NAT.
4. some enhanced features.
5. designed in modular.